Sciweavers

754 search results - page 135 / 151
» Architectural Design Recovery using Data Mining Techniques
Sort
View
INFOSCALE
2007
ACM
13 years 8 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü
DAC
2003
ACM
14 years 7 months ago
Energy-aware MPEG-4 FGS streaming
-- In this paper, we propose an energy-aware MPEG-4 FGS video streaming system with client feedback. In this client-server system, the battery-powered mobile client sends its maxim...
Kihwan Choi, Kwanho Kim, Massoud Pedram
ASAP
2004
IEEE
119views Hardware» more  ASAP 2004»
13 years 10 months ago
Automatic Synthesis of Customized Local Memories for Multicluster Application Accelerators
Distributed local memories, or scratchpads, have been shown to effectively reduce cost and power consumption of application-specific accelerators while maintaining performance. Th...
Manjunath Kudlur, Kevin Fan, Michael L. Chu, Scott...
SIGMOD
2008
ACM
210views Database» more  SIGMOD 2008»
14 years 6 months ago
Private queries in location based services: anonymizers are not necessary
Mobile devices equipped with positioning capabilities (e.g., GPS) can ask location-dependent queries to Location Based Services (LBS). To protect privacy, the user location must n...
Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, C...
ICDE
2007
IEEE
170views Database» more  ICDE 2007»
14 years 8 months ago
Tree-Pattern Similarity Estimation for Scalable Content-based Routing
With the advent of XML as the de facto language for data publishing and exchange, scalable distribution of XML data to large, dynamic populations of consumers remains an important...
Raphaël Chand, Pascal Felber, Minos N. Garofa...